Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Question

A client packet is received by a server. The packet has a destination port number of 67. What service is the client requesting?
click to flip
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't know

Question

What are two problems that can be caused by a large number of ARP request and reply messages?
Remaining cards (60)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CCNA1

FINALS pt.2

QuestionAnswer
A client packet is received by a server. The packet has a destination port number of 67. What service is the client requesting? DHCP
What are two problems that can be caused by a large number of ARP request and reply messages? All ARP request messages must be processed by all nodes on the local network.
What are two problems that can be caused by a large number of ARP request and reply messages? The ARP request is sent as a broadcast, and will flood the entire subnet.
During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry? switch the packet to the directly connected interface
What characteristic describes antispyware? applications that protect end devices from becoming infected with malicious software
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen? SSH
What are the two most effective ways to defend against malware? (Choose two.) Update the operating system and other application software. & Install and update antivirus software.
Which type of security threat would be responsible if a spreadsheet add-on disables the local software firewall? Trojan horse
is software that does something harmful, but is hidden in legitimate software code. Trojan horse
attack results in interruption of network services to users, network devices, or applications. denial of service (DoS)
commonly involves trying to access a network device. brute-force attack
occurs when a program attempts to store more data in a memory location than it can hold. buffer overflow
Which frame field is created by a source node and used by a destination node to ensure that a transmitted data signal has not been altered by interference, distortion, or signal loss? frame check sequence field
A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network? 255.255.255.248
. What service is provided by POP3? Retrieves email from the server by downloading the email to the local mail application of the client.
What two security solutions are most likely to be used only in a corporate environment? (Choose two.) virtual private networks & intrusion prevention systems
What characteristic describes antivirus software? applications that protect end devices from becoming infected with malicious software
What mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network? It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a Time Exceeded message to the source host.
A client packet is received by a server. The packet has a destination port number of 69. What service is the client requesting? TFTP
An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?​ all IPv6 configured routers on the local link​
What are the three parts of an IPv6 global unicast address? (Choose three.) subnet ID, global routing prefix , interface ID
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? interference, security, coverage area
A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured? Exit privileged EXEC mode and press Enter .
What method is used to manage contention-based access on a wireless network? CSMA/CA
What is a function of the data link layer? provides for the exchange of frames over a common local media
What is the purpose of the TCP sliding window? to request that a source decrease the rate at which it transmits data
allows a destination device to inform a source to slow down the rate of transmission. TCP sliding window
What characteristic describes spyware? software that is installed on a user device and collects information about the user
Which switching method drops frames that fail the FCS check? store-and-forward switching
Which range of link-local addresses can be assigned to an IPv6-enabled interface? FE80::/10
What service is provided by FTP? Allows for data transfers between a client and a file server.
A user is attempting to access without success. Which two configuration values must be set on the host to allow this access? (Choose two.) DNS server, default gateway
Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.) NAT introduces problems for some applications that require end-to-end connectivity. & NAT provides a solution to slow down the IPv4 address depletion.
is a technology that is implemented within IPv4 networks. Network Address Translation (NAT)
What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process? 1E6F:65FF:FEC2:BDF8
What service is provided by BOOTP? Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network.
What characteristic describes adware? software that is installed on a user device and collects information about the user
When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached? store-and-forward
What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.) accessing the media & data encapsulation
This field checks if the frame has been damaged during the transfer error detection
this field helps to direct the frame towards its destination addressing
this fields identifies the beginning of a frame frame start
this field is used by the LLC to identify the layer 3 protocol type
What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64? 2001:DA48:FC5:A4::/64​
FIREWALL FUNCTION: prevents access based on IP or MAC address packet filtering
FIREWALL FUNCTION: prevents access to websites URL filtering
FIREWALL FUNCTION: prevents unsolicited incoming sessions stateful packet inspection
FIREWALL FUNCTION: prevents access by port number application filtering
Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior? the network performance baseline
How does the service password-encryption command enhance password security on Cisco routers and switches? It encrypts passwords that are stored in router or switch configuration files.
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.) The Source Address field name from IPv4 is kept in IPv6. & The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
What characteristic describes identity theft? the use of stolen credentials to access private data
A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network? 255.255.255.0
1. What are three commonly followed standards for constructing and installing cabling? cable lengths
2. What are three commonly followed standards for constructing and installing cabling? pinouts,
3.What are three commonly followed standards for constructing and installing cabling? connector types
A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting? IMAP
1.What are two characteristics shared by TCP and UDP? port numbering
2. What are two characteristics shared by TCP and UDP? use of checksum
A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting? FTP
What attribute of a NIC would place it at the data link layer of the OSI model? MAC address
Created by: cessy_comscie
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards